Effect of cell phone on security

that is brief research on the topic of effects of cell phone in security.

Sharing link:

https://doc.co/3EUueK

Use Disqus, a third-party service, to host comments. Anyone who subscribes to Disqus can join the conversation.

What's Docs.com?

Gather, organize, and share content that interests you.

Loading...

Effects Of Cell Phone in Security

MacAfee Lab

Sending messages that contain dangerous attachments (e.g. malware) with text that encourage people to open the attachments.

Pretending to be the main administrator of a local network and asking for the victim’s password in order to perform a maintenance check

Telling a victim over the phone that he/she has won a prize, in return they ask for a credit card number to deliver it

o Asking for a user’s password for a certain Internet service, such as a blog, and later use the same password to access user’s computer. This technique works because users often use the same passwords for many different portals

SMiShing

SMiShing (SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals.

The aim of SMiShing is to trick the user into clicking on a link in a text message; that link goes to a page prompting you to enter personal data.

The objective is to gain access to sensitive information like usernames and passwords. Additionally, many SMiShing messages will include links with malware waiting on the other side for anyone who clicks on them.

Often the SMiShing attempt is easy to spot, with claims that you have won a contest you never entered or an “unclaimed refund” waiting for you.

Many of the same techniques

used in phishing email have made their way over to the SMiShing world

Countries with Most Phishing Websites

Unifying the Global Response to Cybercrime

Financial Frauds

Financial fraud is a criminal behavior in which a person uses wrong methods to trick a

victim out of his money.

The Internet fraud scheme is a common example of financial fraud, which includes emulated

Now a day’s mobile phones are used to perform such kind of activities.

The vast majority of this type of fraud involves the use of card details that have been

fraudulently obtained through methods such as unsolicited emails or telephone calls

or digital attacks such as malware and data hacks.

The card details are then used to undertake fraudulent purchases over the internet,

phone or by mail order. It is also known as ‘card-not-present’ (CNP) fraud.

pakistan

Cell Phone Theft in Punjab

Call Threat

Illegal Sim Card

Bomb Blast

Call Threat

Criminals do threat for Demand money for the return of a captured person Extortion.

Extortion is a crime in which one person forces another person to do something against his will, generally to give up money or other property, by threat of violence, property damage, damage to the person’s reputation, or extreme financial hardship. Extortion involves the victim’s consent to the crime, but that consent is obtained illegally.

Women Harassment

Sexual Harassment

Porno Graph

Leaked MMS

Illegal Issue of Sim Cards

As we see that No Of mobile users increase day by day but some time they use the Illegal sim card.

As we know that if we take the illegal sim card there is no information about the users.

Illegal sim card is too much easy to take in Pakistan in back 2, 3 years ago.

At that time the amount of terrorist attack increate at larger amount and any other illegal activities there is no information about the user who uses the card so that person can take part in many other illegal issues related to security. But PTA look after these issues and overcome the illegal issues of the sim card using the biometric thumb scan

Bomb Blasts

Four kinds of devices have been used in bombs attacks – remote controls, mobile phones, timers and manual bombs. Terrorists connects bombs with the mobile phones. Mobile-phone-controlled devices are often used during processions that take time so they can fix the device according to the procession’s schedule. In such cases, the terrorists have an advantage that they can detonate the bomb from any part of the world

Up to three years’ imprisonment, Rs.1 million fine or both for unauthorized access to critical infrastructure information system or data.

Up to seven years, Rs10 million fine or both for interference with critical infrastructure information system or data with dishonest intention.

Up to seven years, Rs10 million fine or both for glorification of an offence relating to terrorism, any person convicted of a crime relating to terrorism or proscribed individuals or groups. Glorification is explained as “depiction of any form of praise or celebration in a desirable manner”.

Up to six months’ imprisonment, Rs50 thousand or both for producing, making, generating, adapting, exporting, supplying, offering to supply or importing a device for use in an offence.

Up to three years’ imprisonment, Rs5 million fine or both for obtaining, selling, possessing, transmitting or using another person’s identity information without authorization .

If your identity information is used without authorization, you may apply to the authorities to secure, destroy or prevent transmission of your information.

The vast majority of this type of fraud involves the use of card details that have been

fraudulently obtained through methods such as unsolicited emails or telephone calls

or digital attacks such as malware and data hacks.

The card details are then used to undertake fraudulent purchases over the internet,

phone or by mail order. It is also known as ‘card-not-present’ (CNP) fraud.

pakistan

Cell Phone Theft in Punjab

Call Threat

Illegal Sim Card

Bomb Blast

Call Threat

Criminals do threat for Demand money for the return of a captured person Extortion.

Extortion is a crime in which one person forces another person to do something against his will, generally to give up money or other property, by threat of violence, property damage, damage to the person’s reputation, or extreme financial hardship. Extortion involves the victim’s consent to the crime, but that consent is obtained illegally.

Women Harassment

Sexual Harassment

Porno Graph

Leaked MMS

Illegal Issue of Sim Cards

As we see that No Of mobile users increase day by day but some time they use the Illegal sim card.

As we know that if we take the illegal sim card there is no information about the users.

Illegal sim card is too much easy to take in Pakistan in back 2, 3 years ago.

At that time the amount of terrorist attack increate at larger amount and any other illegal activities there is no information about the user who uses the card so that person can take part in many other illegal issues related to security. But PTA look after these issues and overcome the illegal issues of the sim card using the biometric thumb scan

Bomb Blasts

Four kinds of devices have been used in bombs attacks – remote controls, mobile phones, timers and manual bombs. Terrorists connects bombs with the mobile phones. Mobile-phone-controlled devices are often used during processions that take time so they can fix the device according to the procession’s schedule. In such cases, the terrorists have an advantage that they can detonate the bomb from any part of the world

Up to three years’ imprisonment, Rs.1 million fine or both for unauthorized access to critical infrast